default search action
International Journal of Security and Networks (IJSN), Volume 1
Volume 1, Number 1/2, 2006
- Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Workflow authorisation in mediator-free environments. 2-12 - Eunjin Jung, Mohamed G. Gouda:
Vulnerability analysis of certificate graphs. 13-23 - Aggelos Kiayias, Moti Yung:
Secure scalable group signature with dynamic joins and separable authorities. 24-45 - Matthew K. Franklin:
A survey of key evolving cryptosystems. 46-53 - Ihab Hamadeh, George Kesidis:
A taxonomy of internet traceback. 54-61 - Arshad Jhumka, Felix C. Freiling, Christof Fetzer, Neeraj Suri:
An approach to synthesise safe systems. 62-74 - Joseph B. Evans, Weichao Wang, Benjamin J. Ewy:
Wireless networking security: open issues in trust, management, interoperation and measurement. 84-94 - Håkan Englund, Thomas Johansson:
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. 95-102 - Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli:
Building trust in peer-to-peer systems: a review. 103-112 - Mahalingam Ramkumar, Nasir D. Memon:
Secure collaborations over message boards. 113-124
Volume 1, Number 3/4, 2006
- Haodong Wang, Bo Sheng, Qun Li:
Elliptic curve cryptography-based access control in sensor networks. 127-137 - Jianliang Zheng, Jie Li, Myung J. Lee, Michael Anshel:
A lightweight encryption and authentication scheme for wireless sensor networks. 138-146 - Jamal N. Al-Karaki:
Analysis of routing security-energy trade-offs in wireless sensor networks. 147-157 - Ortal Arazi, Hairong Qi:
Load-balanced key establishment methodologies in wireless sensor networks. 158-166 - Jing Deng, Richard Han, Shivakant Mishra:
Limiting DoS attacks during multihop data delivery in wireless sensor networks. 167-178 - Jing-Shyang Hwu, Shih-Feng Hsu, Yi-Bing Lin, Rong-Jaye Chen:
End-to-end security mechanisms for SMS. 177-183 - Xinyuan Wang:
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. 184-197 - Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen:
A self-encryption authentication protocol for teleconference services. 198-205 - Stephen F. Owens, Reuven R. Levary:
An adaptive expert system approach for intrusion detection. 206-217 - Yiqun Chen, Willy Susilo, Yi Mu:
Convertible identity-based anonymous designated ring signatures. 218-225 - Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng:
Low-power authenticated group key agreement for heterogeneous wireless networks. 226-236 - Chik How Tan:
A new signature scheme without random oracles. 237-242 - Yu Liu, Cristina Comaniciu, Hong Man:
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. 243-254 - Vasileios Karyotis, Symeon Papavassiliou, Mary Grammatikou, Vasilis Maglaris:
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks. 255-265
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.